This Web3 Security Tool Transform a $1,000 to a $1,000,000 Bounty | Glider by Hexens Tutorial

Поділитися
Вставка
  • Опубліковано 28 чер 2024
  • This Web3 Security Tool Changes The Game | Glider by Hexens Tutorial
    Glider, a powerful new tool created by Hexens, is here to take your Web3 bug-hunting game to the next level. In this video, I’ll show you how to leverage Glider to uncover vulnerabilities across multiple smart contracts and potentially earn significant bug bounties.
    ~~~ Links ~~~
    Try Glider for free: johnnytime.xyz/glider
    Become a certified smart contract hacker: johnnytime.xyz/smart-contract...
    Highlights:
    - $50,000 Web3 Bounty Example: Learn from a recent discovery by Trust Security that earned them $50,000 by identifying a denial-of-service bug across multiple projects.
    - Scale Your Efforts: Discover how to use Glider to find similar bugs in different protocols, increasing your bug bounty rewards exponentially.
    - How Glider Works: Understand how to craft queries in CodeQL to search for vulnerabilities in smart contracts on Ethereum test networks and mainnet.
    - Practical Demonstrations: Follow along with practical demos showing how to identify contracts with the selfdestruct opcode and detect ERC777 reentrancy vulnerabilities.
    ~~~ Timestamps ~~~
    00:00 Intro
    01:00 Maximizing Web3 Bug Bounties
    03:07 What is Glider
    06:20 Demo 1 - selfdestruct
    09:55 Demo 2 - selfdestruct Advanced
    12:18 Demo 3 - Open Burn Function
    13:50 Demo 4 - ERC777 Reentrnacy Bugs
    15:22 Summary
  • Наука та технологія

КОМЕНТАРІ • 16

  • @tpiliposian
    @tpiliposian Місяць тому

    Great vid!!!

  • @kamalchan9756
    @kamalchan9756 Місяць тому

    thank you bro

  • @newconam6574
    @newconam6574 Місяць тому

    Getting this error, should I provide my own rpc for mainnet?: "root":{1 item
    "NoAccess":string"You don't have access to mainnet instances, please contact the support."
    }

    • @JohnnyTime
      @JohnnyTime  Місяць тому

      You need to request access to mainnet :)

  • @mukulsaini7297
    @mukulsaini7297 Місяць тому +1

    Hi, there is no link in the description

  • @user-vp7mv9du5l
    @user-vp7mv9du5l Місяць тому +2

    this is also very very dangerous, not only it allows white hackers to find bugs, but this way black hackers could easily search for exploits

    • @JohnnyTime
      @JohnnyTime  Місяць тому

      Indeed, that's why the team is not granting Mainnet access to everyone and controlling it.

  • @satyasai69
    @satyasai69 Місяць тому

    It is a open source or not

    • @JohnnyTime
      @JohnnyTime  Місяць тому

      Not open source but free to use

  • @koaglide
    @koaglide Місяць тому

    hey look, another company copying my style and name haha. love it , its got to be like 400 famous people by now, literally the most influential man in the world. i said it before andew tate, i even said failed society before him. i could go on for hours life is just so crazy

  • @steiner254
    @steiner254 Місяць тому +1

    Nice